File tree Expand file tree Collapse file tree 2 files changed +40
-36
lines changed Expand file tree Collapse file tree 2 files changed +40
-36
lines changed Original file line number Diff line number Diff line change @@ -1921,7 +1921,8 @@ module searchService 'br/public:avm/res/search/search-service:0.11.1' = {
19211921 managedIdentities : {
19221922 systemAssigned : true
19231923 }
1924- publicNetworkAccess : enablePrivateNetworking ? 'Disabled' : 'Enabled'
1924+ // publicNetworkAccess: enablePrivateNetworking ? 'Disabled' : 'Enabled'
1925+ publicNetworkAccess : 'Enabled'
19251926 networkRuleSet : {
19261927 bypass : 'AzureServices'
19271928 }
@@ -1951,23 +1952,24 @@ module searchService 'br/public:avm/res/search/search-service:0.11.1' = {
19511952 principalType : 'ServicePrincipal'
19521953 }
19531954 ]
1954- privateEndpoints : enablePrivateNetworking
1955- ? [
1956- {
1957- name : 'pep-search-${solutionSuffix }'
1958- customNetworkInterfaceName : 'nic-search-${solutionSuffix }'
1959- privateDnsZoneGroup : {
1960- privateDnsZoneGroupConfigs : [
1961- {
1962- privateDnsZoneResourceId : avmPrivateDnsZones [dnsZoneIndex .search ]!.outputs .resourceId
1963- }
1964- ]
1965- }
1966- subnetResourceId : virtualNetwork !.outputs .subnetResourceIds [0 ]
1967- service : 'searchService'
1968- }
1969- ]
1970- : []
1955+ privateEndpoints :[]
1956+ // privateEndpoints: enablePrivateNetworking
1957+ // ? [
1958+ // {
1959+ // name: 'pep-search-${solutionSuffix}'
1960+ // customNetworkInterfaceName: 'nic-search-${solutionSuffix}'
1961+ // privateDnsZoneGroup: {
1962+ // privateDnsZoneGroupConfigs: [
1963+ // {
1964+ // privateDnsZoneResourceId: avmPrivateDnsZones[dnsZoneIndex.search]!.outputs.resourceId
1965+ // }
1966+ // ]
1967+ // }
1968+ // subnetResourceId: virtualNetwork!.outputs.subnetResourceIds[0]
1969+ // service: 'searchService'
1970+ // }
1971+ // ]
1972+ // : []
19711973 }
19721974}
19731975
Original file line number Diff line number Diff line change @@ -1962,7 +1962,8 @@ module searchService 'br/public:avm/res/search/search-service:0.11.1' = {
19621962 managedIdentities : {
19631963 systemAssigned : true
19641964 }
1965- publicNetworkAccess : enablePrivateNetworking ? 'Disabled' : 'Enabled'
1965+ // publicNetworkAccess: enablePrivateNetworking ? 'Disabled' : 'Enabled'
1966+ publicNetworkAccess : 'Enabled'
19661967 networkRuleSet : {
19671968 bypass : 'AzureServices'
19681969 }
@@ -1992,23 +1993,24 @@ module searchService 'br/public:avm/res/search/search-service:0.11.1' = {
19921993 principalType : 'ServicePrincipal'
19931994 }
19941995 ]
1995- privateEndpoints : enablePrivateNetworking
1996- ? [
1997- {
1998- name : 'pep-search-${solutionSuffix }'
1999- customNetworkInterfaceName : 'nic-search-${solutionSuffix }'
2000- privateDnsZoneGroup : {
2001- privateDnsZoneGroupConfigs : [
2002- {
2003- privateDnsZoneResourceId : avmPrivateDnsZones [dnsZoneIndex .search ]!.outputs .resourceId
2004- }
2005- ]
2006- }
2007- subnetResourceId : virtualNetwork !.outputs .subnetResourceIds [0 ]
2008- service : 'searchService'
2009- }
2010- ]
2011- : []
1996+ privateEndpoints :[]
1997+ // privateEndpoints: enablePrivateNetworking
1998+ // ? [
1999+ // {
2000+ // name: 'pep-search-${solutionSuffix}'
2001+ // customNetworkInterfaceName: 'nic-search-${solutionSuffix}'
2002+ // privateDnsZoneGroup: {
2003+ // privateDnsZoneGroupConfigs: [
2004+ // {
2005+ // privateDnsZoneResourceId: avmPrivateDnsZones[dnsZoneIndex.search]!.outputs.resourceId
2006+ // }
2007+ // ]
2008+ // }
2009+ // subnetResourceId: virtualNetwork!.outputs.subnetResourceIds[0]
2010+ // service: 'searchService'
2011+ // }
2012+ // ]
2013+ // : []
20122014 }
20132015}
20142016
You can’t perform that action at this time.
0 commit comments